Finshir : A Coroutines-Driven Low & Slow Traffic Sender

6 years ago

Finshir is a high-performant, coroutines-driven, and fully customisable implementation of Low & Slow load generator designed for real-world pentesting. You…

Metabigor : Command Line Search Engines Without Any API Key

6 years ago

Metabigor allows you do query from command line to awesome Search Engines (like Shodan, Censys, Fofa, etc) without any API…

AutoPwn : Automate Repetitive Tasks For Fuzzing

6 years ago

Completely re-writing this right now. Focus will be on interactive Linux apps that only take input from stdin for starters.…

UserRecon-PY : Find Username In Social Networks

6 years ago

Userrecon-PY is a tool used to find usernames in social networks. Installation Install dependencies (Debian/Ubuntu): sudo apt install python3 python3-pip…

Amass : In-Depth DNS Enumeration and Network Mapping

6 years ago

The OWASP Amass tool suite obtains subdomain names by scraping data sources, recursive brute forcing, crawling web archives, permuting/altering names…

PCI Compliance and Network Segmentation

6 years ago

The first step to determining the scope of your Payment Card Industry Data Security Standard (PCI DSS) compliance is segmenting…

WPBullet : A Static Code Analysis For WordPress & PHP

6 years ago

WPBullet is a static code analysis for WordPress Plugins/Themes (and PHP). Simply clone the repository, install requirements and run the…

Kubolt : Utility For Scanning Public Kubernetes Clusters

6 years ago

Kubolt is simple utility for scanning public unauthinticated kubernetes clusters and run commands inside containers. Sometimes, the kubelet port 10250…

PhoneSploit : Using Open ADB Ports We Can Exploit A Android Device

6 years ago

PhoneSploit is using open Adb ports we can exploit a Android Device. You can find open ports by clicking here.…

Brutality : A Fuzzer For Any GET Entries

6 years ago

A Brutality is a fuzzer for any GET entries and following are the features ; Multi-threading on demandFuzzing, bruteforcing GET…